Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    18-10-2021 09:37

General

  • Target

    Proforma Invoice PDF.exe

  • Size

    82KB

  • MD5

    e77c819969d8520d9bbd027dd1bfaa04

  • SHA1

    27d6482b5777767e98838d5dd2e9d431e2f3ae97

  • SHA256

    6fa5cdc1c01f21f752a968277cb495f3bf83b9171456b83483be4d5d4cea543d

  • SHA512

    de26847a6cc7244ecf566ab2e3126ab27f14b86a8404f30871fc0606fcac8e2dec21c2552c777e7faa945136343e0999c5017e015d72ab79990c5373d40f5748

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Proforma Invoice PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\Proforma Invoice PDF.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
        PID:472

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1688-54-0x00000000013D0000-0x00000000013D1000-memory.dmp

      Filesize

      4KB

    • memory/1688-56-0x000000001AB90000-0x000000001AB92000-memory.dmp

      Filesize

      8KB

    • memory/1688-57-0x0000000000250000-0x0000000000252000-memory.dmp

      Filesize

      8KB

    • memory/1688-58-0x00000000004C0000-0x00000000004D1000-memory.dmp

      Filesize

      68KB